Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
-
Size
660KB
-
MD5
3c55af3c92b682b83773ef3a99281f7c
-
SHA1
2ae250bd641fee2cb6736da37a1a329ac2f0bbd9
-
SHA256
73c65dfa67b61fd31bc3a58da5c919e60bcaffe66e3b8dc3710c085dac272830
-
SHA512
935783d7b0c520925a72389e1b43af3d7a1cb337f0f70a2fe80f0b2ec4dbccae54250c985da7f2bd74e783594c6dbe90d8d5aaa4e7da1533e7a4522b3847f950
-
SSDEEP
12288:rkoICAa5jUPa9ZDNNSBZpkJqRl7k86fpgBDDJrS7LE9HTFIUYVRSs5KHwY:IoICAsjVRmsJS7kF6lDJqLGT4RSsk
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Executes dropped EXE 2 IoCs
pid Process 1532 rundll32.exe 4552 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "rundll32.exe" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rundll32.exe 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe File created C:\Windows\rundll32.exe 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\ = "ADODB.Connection" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\System\\ado\\msado15.dll" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\ProgID 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\ProgID\ = "ADODB.Connection.6.0" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\VersionIndependentProgID 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770} 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\InprocServer32 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\InprocServer32\ThreadingModel = "Apartment" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A96DC65D-C21B-CCDB-1510-0342AF936770}\VersionIndependentProgID\ = "ADODB.Connection" 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\ProgramData\TEMP:A7E78C07 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe File opened for modification C:\ProgramData\TEMP:A7E78C07 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe File opened for modification C:\ProgramData\TEMP:A7E78C07 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: 33 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe Token: 33 4552 rundll32.exe Token: SeIncBasePriorityPrivilege 4552 rundll32.exe Token: 33 4552 rundll32.exe Token: SeIncBasePriorityPrivilege 4552 rundll32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4140 wrote to memory of 4484 4140 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 85 PID 4484 wrote to memory of 1532 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 90 PID 4484 wrote to memory of 1532 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 90 PID 4484 wrote to memory of 1532 4484 3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe 90 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91 PID 1532 wrote to memory of 4552 1532 rundll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\rundll32.exe"C:\Windows\rundll32.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\rundll32.exe"C:\Windows\rundll32.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD52e3a76c680f42dcc0a34fb9f83141b1b
SHA1b5f1b0c2f5e356772535dc319c42cb7fc9858663
SHA25654185276b52333a128b7d9df649f558c30dc130345cdb548795d3ad7327182ab
SHA512a7e16b8d8d10a49b9c97b4907216fbf547e3ccec10974599ef4b607259bb9a326c93ae3f8af0021a61178010f532cbf886d8d4f980827a19af5e5e7a0cf58650
-
Filesize
660KB
MD53c55af3c92b682b83773ef3a99281f7c
SHA12ae250bd641fee2cb6736da37a1a329ac2f0bbd9
SHA25673c65dfa67b61fd31bc3a58da5c919e60bcaffe66e3b8dc3710c085dac272830
SHA512935783d7b0c520925a72389e1b43af3d7a1cb337f0f70a2fe80f0b2ec4dbccae54250c985da7f2bd74e783594c6dbe90d8d5aaa4e7da1533e7a4522b3847f950